EOL IT Services has now merged with tier1 Asset Management Ltd

Security Limitations of the Solid State Drive

by | Aug 22, 2017 | IT Security, News

The expansion and innovation of storage mediums has been a priority since the start of personal computing. While some of the traditional hard drives, HDDs, have remained much the same for over 50 years, faster and more efficient storage technologies, such as SSDs, have become available and are becoming more and more popular. However, as efficient as they might be, these new SSDs aren’t risk free, but what exactly are the security limitations of using solid state drives?

Differences between HDDs and SSDs

The main difference between HDDs and SSDs are that SSDs do not use a spinning disk to store data, and it is this lack of movement that makes the newer storage drives faster than their traditional counterparts. Solid state drives have lower latency, as well as faster read/writes, and are able to support more input/output operations per second. SSDs are also more durable than traditional HDDs, weigh less and have lower operating costs, which justifies their higher price than HDDs- though solid state drives are becoming more and more affordable.

Another important difference between the two is that, while disk defragmentation can be used with HDDs to improve a machine’s performance, this is not suitable for SSDs. In fact, disk defragmentation could actually damage the drive over time.

There are three principle types of solid state drives, though they come in a variety of different interface formats, and these are:

-PCIe drives, which are suitable for buffering and caching applications and loading databases. The large demand for video for customer apps is what makes PCIe drives popular;

-NVMe drives, which are known for having a better hardware interface, a shorter hardware data path and a simplified data stack;

-SATA drives, which are available in terabyte instances. SSDs with SATA  are a great transition from traditional legacy HDDs, which also use the SATA interface.

Data Destruction Concerns

The fact that SSDs use flash memory chips, rather than a spinning disk, to store their data, means they have specific requirements in terms of data destruction. This alternative storage method can mean there are extra security concerns when it comes to erasing or destroying data. The main concerns for SSD data destruction:

Degaussing– This is a popular, tried and tested technique for data destruction, but is not effective for solid state drives. This is because instead of storing data magnetically, SSDs use integrated circuit assemblies.

Crypto-Erase– Though this new type of data destruction can delete all security keys that hold data on devices, it isn’t actually suitable for SSDs because the crypto keys can be broken, and data accessed after the process. The unreliability of Crypto-Erase for SSDs is heightened in the fact that its use is not consistent among different manufacturers.

Physical Destruction– Physical destruction might sound the most definite, but SSDs and their IC chips are not fully destroyed by standard hard drive shredders, which means it is unsuitable for them as hackers could still recover their data. Solid state drives can be shredded, but would require a much smaller shredding size.

Overwriting– Though it is possible to effectively erase data from SSDs through overwriting, this cannot necessarily be done in-house, as solid state drives often defeat traditional methods of overwriting as certain blocks of data were ‘blocked’ or deemed ‘unavailable’ by the controller. This means that a simple deletion and overwrite of data still leaves the possibility of data remanance, meaning hackers can recover or recreate the data from residual information on the drive. For overwriting SSDs to be successful, it must be performed properly by an ITAD expert.

Security Limitations – The Solutions

Because of the data destruction and  security limitations of SSDs, there are only really two ways to ensure the safe disposal of data stored on them, and whichever of these you choose should be done with the help of an ITAD specialist to guarantee the security of your data:

  • 6mm Shredding – One option would be to physically destroy the drive using a 6mm blade shredder. Blades need to be this small, or smaller, to ensure that the data stored on the SSD is destroyed to the point that it cannot be recovered.  EOL offer CPNI approved shredding to 6mm and you can find out more here https://www.tier1.com/services/
  • Blancco SSD data erasure – Blancco’s patented SSD data erasure technology has solutions for all data erasure needs and can provide guarantees of any erasure performed. The technology uses compressed random data that cannot be de-duplicated in the process, and searches for any firmware issues in the process to ensure successful overwriting and to guarantee complete data destruction and the impossibility of data recovery. You can find more information about Blancco SSD erasure at https://www.blancco.com/blog-what-do-you-really-know-about-ssd-erasure/

Though SSDs are a much more effective and faster solution for data storage as you are using them, it is important to remember that data destruction techniques are not yet up to date with them. This means that, in order that your data is secure even after the use of your drive, you must invest in appropriate data erasure to avoid any security limitations.

With over 25 years industry experience, tier1 are proud to be the UK’s most accredited ITAD supplier. We possess the skills, accreditations and experience to handle our clients’ data with the care they deserve, and to dispose of it responsibility and legally.

Contact us today on 0161 777 1000 or visit https://www.tier1.com to find out how we can help you dispose of your data safely and reliably.

Recent Stories

The Hidden Environmental Impact of Our Smartphones.

The Hidden Environmental Impact of Our Smartphones.

Checking emails, social media or the news; banking, making payments, taking photographs, finding our way; it is fair to say that we would be lost without our smartphones, perhaps literally. Oh, let’s not forget, our now indispensable devices also make calls. Essential...

Delivering Social Value Through Our Business Operations

Delivering Social Value Through Our Business Operations

We have become increasingly aware of economic, social and environmental issues. Our renewed sense of community, which naturally came into focus during Government lockdowns, furthered the opportunity for ethical businesses to drive social impact, rather than simply be...

Navigating the Subjectivity of Refurbished IT Devices

Navigating the Subjectivity of Refurbished IT Devices

Reconditioned, renewed, pre-owned… as there are no hard and fast definitions of what the phrase ‘refurbished technology’ means, purchasing restored devices can feel a little like navigating a minefield. This confusion, poor experiences or deep-rooted misconceptions...

Categories